Transcription

1 Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle

2 Events are not correlated. Tools are not integrated. Teams are not connected. Knowledge is not shared. The IT security gap is getting bigger. And more and more organisations and sensitive data - are falling through the cracks. Nine out of ten large organisations experienced a security breach last year1. Making the right investments From denial of service attacks and virus infections to device theft and fraud, the origins of these breaches are steadily increasing. And so too is the financial fallout. It s estimated that the global losses from cyber crime have now topped $300 billion per year2. Security budgets went up by around 51 per cent in 2013 compared with the previous year4. Yet security incidents still increased by 25 per cent4 and this only accounts for those incidents that were actually detected. Many more happen in the IT shadows. Are you secure? has truly become a billion-dollar question - a question that very few organisations can answer with a categorical yes. With 49 per cent of organisations planning to increase their security spend in the next 12 months4, IT departments need to ensure they are investing in the right mix of solutions, skills and strategies to bolster their defences. Welcome to the new normal Faced with a myriad of options from a myriad of vendors, many IT professionals struggle to decide which security solutions need to be retired, refreshed or retained. With a relentless stream of new threats emerging mobile malware alone grew by 614 per cent in the space of a single year3 an organisation s security position is in a constant state of flux. A website that was secure on the Sunday might be compromised on the Monday as demonstrated by the first Heartbleed incidents in April The sheer number of threat actors and different levels of capability mean that large organisations potentially have too much to track and assess. Without the help of others - in terms of threat intelligence and assessment, as well as supply chain security cyber defence becomes difficult, observes Gartner5. It s not just security threats that are evolving; cloud, virtualisation, software-defined and mobility initiatives mean that organisations infrastructures are continually shifting too, creating new chinks in the IT security armour. Redefining the perimeter With hackers and malware architects now using automated toolkits and taking a profit-driven approach to their activities, these chinks will be discovered and rapidly exploited. In 2012, the median number of security breaches suffered by a large organisation was 71; in 2013 it was With threats increasing in volume, variety and velocity on a daily basis, organisations don t just risk falling through a security gap, they risk failing into a security black hole. Simply throwing more money at the problem is not the answer. It might buy more peace of mind, but it won t necessarily buy more protection. Many organisations have under-estimated just how much the security landscape has changed. Despite the rising tide of threats and breaches, 74 per cent of organisations believe their security activities are effective4. But security strategies can only be effective if organisations understand the full breadth and depth of the challenge. To gain this understanding, they must first close the gap in knowledge, tools and teams. Security can no longer be viewed in relation solely to a network port or a server. It must be viewed in relation to the business. As Gartner states: Security and risk are fundamentally intertwined with everything an organisation does, forming a matrix of interconnected risks and rewards. 5 Every application, every device, every web-based service is now a potential entry point and therefore a potential risk. The traditional perimeter no longer exists. This is the new normal - and it demands a radically different approach to security. As Gartner confirms: Traditional defences, such as signature-based anti-malware tools and stateful inspection firewall technology, are less and less effective against new threats. 6 Organisations don t just need new tools and technologies to survive the new normal, they also need to tighten up their security processes and sharpen up their strategies. And do it on a continual basis. As Gartner advises: Security practitioners must shape and reshape security architecture and programmes to keep a balance between business enablement and risk management in 2014 and beyond

3 Finding the gaps Secure an advantage As the threat landscape continues to evolve and expand, greater visibility of an organisation s security position will become a critical success factor. To ensure improvement efforts are focused on the right areas, organisations must first understand where they are and where they want to be with their security position. They need to assess. They need to audit. And they need to act. IT departments are already at a massive disadvantage, fighting simultaneous battles without knowing the nature or number of their enemies. And that disadvantage will only increase if organisations fail to adapt to the new normal. With security no longer constrained by any perimeter, these activities must encompass a wide range of risks across a wide range of end-points. Given such complexity, it s not surprising that a quarter of organisations have never carried out any form of security risk assessment1. By integrating tools, automating processes and aggregating knowledge, IT departments will have a better chance of closing the security gap and winning some battles. And the business will have a better chance of avoiding the financial penalties and reputational damage that invariably come with security breaches. Until then, that billiondollar question will remain unanswered. Working with an external partner will not only simplify but also accelerate the assessment process - and the closing of any gaps. Security assessments should span each stage of the attack cycle - before, during and after and pinpoint areas for improvement. BEFORE DURING AFTER Control Enforce Harden Detect Block Defend Scope Contain Remediate Network access control & Identity services VPN Firewall UTM Adaptive Authentication Data loss protection IPS Web Security SIEM Security To find out how we can help you close the security gap, talk to your Account Manager or contact us at or via our Switchboard +44 (0) Advanced Malware Protection Network Behaviour Analysis End-point encryption Maximise protection throughout the security cycle Organisations need to extend their security focus beyond just defending against inbound threats. By deploying security solutions that map to every stage of the attack continuum, organisations will be able to not only defend, but also control and contain. 18% increase 84% of Detecting and defending are often the main focus of an organisation s security strategy and any assessments. Yet to improve both these capabilities, IT departments must also assess what they do after an attack and how they adapt their processes. large organisations suffered staff-related security incidents1 As Gartner states: Security processes, unlike appliances, software and services, cannot be acquired in exchange for cash. They can only be established by an organisation and then mature to an appropriate level. 7 in the average financial cost of a security incident4 78% of large organisations were attacked by an unauthorised outsider1 Gaining the visibility advantage An integrated approach is key to reaching a higher level of maturity and achieving better outcomes. By unifying people, process and tools at every stage of the security cycle, organisations will be able to identify, block and remediate a threat as it travels from the client device to the network to the datacenter. For example, there s no point the end user services team detecting an abnormal log-in on a smartphone before an attack, if this information is not available to the security operations team during a subsequent virus outbreak. Greater automation across the security cycle will not only simplify the sharing of such event information, but also accelerate the response. When an attack strikes the importance of relevant pre-attack insight cannot be underestimated. Locating that insight in a timely, digestible manner, however, remains a challenge. Automating the correlation of events across the IT infrastructure is fundamental to providing organisations with a single view of the attack status and its potential source Information Security Breaches Survey, PWC and Infosecurity Europe Estimating the Cost of Cybercrime and Cyber Espionage, Center for Strategic and International Studies, July 2013 Mobile Threats Report, Juniper Networks, March 2013 Global State of Information Security Survey 2014, PWC 2014 Planning Guide for Security and Risk Management, Gartner, October 2013 Predicts 2014: Security Solutions, Gartner, November 2013 Vulnerability and Security Configuration Assessment Solutions Comparison, Gartner, April

4 Adapt to the new normal: 10 steps for strengthening security Computacenter s security credentials: Our skills and solutions span the entire IT stack from the workplace to the network and the datacenter 1 Unify management across wired and wireless environments with consolidated security tools and technologies 2 Regularly conduct security assessments to identify gaps in tools, policies and defences 3 Correlate information about security events across datacenter, workplace and networking devices 4 Review and reinforce basic controls such as patch management and anti-malware measures 5 Undertake a profiling exercise that maps access rights and security controls to different workstyles 6 Maintain a threat assessment framework to identify the origins of different risks and to prioritise how to respond 7 Enhance staff education programmes and publish regular updates on risks and regulations 8 Monitor internal usage of applications and databases and establish context-aware capabilities 9 Implement policies for data usage in the cloud and on employee-owned mobile devices We have developed a range of assessments that help organisations define and deliver a multi-layered information security framework We manage thousands of devices and events every month for our customers, which gives us a unique insight into emerging and evolving security risks Computacenter has been working with Cisco for more than three decades and has been a Gold Partner since 1998 We hold Cisco Advanced Technology Provider specialisations in eight disciplines, including Telepresence, Security, Networking and Unified 10 6 Communications and Collaboration We don t add or do security: it s automatically part of every solution that we deliver Increase the level of forensic visibility you can t respond to things that you can t see 7

5 Computacenter (UK) Ltd Hatfield Avenue, Hatfield Hertfordshire AL10 9TW United Kingdom T: +44 (0) F: +44 (0) Computacenter 2014 Computacenter is Europe s leading independent provider of IT infrastructure services, enabling users and their business. We advise customers on their IT strategy, implement the most appropriate technology from a wide range of leading vendors and manage their technology infrastructures on their behalf. At every stage we make our customers businesses sharper by removing cost, complexity and barriers to change across their IT infrastructures. Computacenter operates in the UK, Germany, France and the Benelux countries, as well as providing transnational services across the globe.

Will your WLAN cope with the mobile era? Make sure you have the capacity and security to ride the wireless wave NEW RESEARCH REVEALS MORE USERS AND DEVICES ARE FLOODING THE CORPORATE WLAN THAN EVER BEFORE.

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

Securing the network for BYOD Computacenter and Cisco in partnership The growth of personal devices in the workplace will impact every facet of IT. Computacenter enables organisations to take a cohesive

Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture

MOBILITY: FROM NOVELTY TO COMMODITY HOW TO MAXIMISE THE BUSINESS VALUE OF MOBILITY IN FIVE EASY STEPS GETTING MOBILE RIGHT Mobility has stepped out of the consumerisation shadows to become a true enterprise

SERVICES SOLUTION SUMMARY SEIZE THE ADVANTAGE From the workplace to the datacenter, the enterprise cloud footprint is growing. It delivers on-demand development resources. It accommodates new digital workloads.

White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as

External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

Realising the potential of your data and driving the transformation to effective, efficient business WITH DATA VOLUMES GROWING AT 41 PER CENT A YEAR 1, IT S TIME TO TAKE BACK CONTROL. IT S ON USER DEVICES.

White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks

Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

IBM AND COMPUTACENTER: POWERING AHEAD TOGETHER DELIVERING BETTER VALUE AND BETTER OUTCOMES Greater globalisation, digitisation and mobilisation can represent both an obstacle and an opportunity. At Computacenter,

TAP INTO THE FULL POTENTIAL OF MICROSOFT ADDRESSING TODAY S COLLABORATION Goodbye desk, goodbye office. Hello hotel room, home study and coffee shop. New ways of working and greater mobility are pushing

White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past

The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges

Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities

Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent

Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used

Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for

The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent

McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,

What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the Effort Out of Log Management and Gain the Actionable Information You Need to Improve Your Organisation s